CVE-2024-57946 (GCVE-0-2024-57946)
Vulnerability from cvelistv5
Published
2025-01-21 12:22
Modified
2025-11-03 20:56
Summary
In the Linux kernel, the following vulnerability has been resolved: virtio-blk: don't keep queue frozen during system suspend Commit 4ce6e2db00de ("virtio-blk: Ensure no requests in virtqueues before deleting vqs.") replaces queue quiesce with queue freeze in virtio-blk's PM callbacks. And the motivation is to drain inflight IOs before suspending. block layer's queue freeze looks very handy, but it is also easy to cause deadlock, such as, any attempt to call into bio_queue_enter() may run into deadlock if the queue is frozen in current context. There are all kinds of ->suspend() called in suspend context, so keeping queue frozen in the whole suspend context isn't one good idea. And Marek reported lockdep warning[1] caused by virtio-blk's freeze queue in virtblk_freeze(). [1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/ Given the motivation is to drain in-flight IOs, it can be done by calling freeze & unfreeze, meantime restore to previous behavior by keeping queue quiesced during suspend.
Impacted products
Vendor Product Version
Linux Linux Version: b7bfaea8f5ecd290864f5ae4c69859b89832b4dc
Version: 5fe446b245ba61ddc924d7db280bcd987c39357a
Version: 2a52590ac52394540351d8289cc2af0b83cf7d31
Version: db48acce75d73dfe51c43d56893cce067b73cf08
Version: 8946924ff324853df6b7c525a7467d964dfd11c3
Version: 4ce6e2db00de8103a0687fb0f65fd17124a51aaa
Version: 4ce6e2db00de8103a0687fb0f65fd17124a51aaa
Version: 2b5128c714d863cd8d259aa9d87bed2d6aa6a5a8
Version: c67ed40b1b4a66e3a13b21bdfbd0151639da5240
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-57946",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-01T19:52:30.682704Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-667",
                "description": "CWE-667 Improper Locking",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-01T19:57:13.037Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T20:56:12.738Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/block/virtio_blk.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d738f3215bb4f88911ff4579780a44960c8e0ca5",
              "status": "affected",
              "version": "b7bfaea8f5ecd290864f5ae4c69859b89832b4dc",
              "versionType": "git"
            },
            {
              "lessThan": "9ca428c6397abaa8c38f5c69133a2299e1efbbf2",
              "status": "affected",
              "version": "5fe446b245ba61ddc924d7db280bcd987c39357a",
              "versionType": "git"
            },
            {
              "lessThan": "6dea8e3de59928974bf157dd0499d3958d744ae4",
              "status": "affected",
              "version": "2a52590ac52394540351d8289cc2af0b83cf7d31",
              "versionType": "git"
            },
            {
              "lessThan": "9e323f856cf4963120e0e3892a84ef8bd764a0e4",
              "status": "affected",
              "version": "db48acce75d73dfe51c43d56893cce067b73cf08",
              "versionType": "git"
            },
            {
              "lessThan": "12c0ddd6c551c1e438b087f874b4f1223a75f7ea",
              "status": "affected",
              "version": "8946924ff324853df6b7c525a7467d964dfd11c3",
              "versionType": "git"
            },
            {
              "lessThan": "92d5139b91147ab372a17daf5dc27a5b9278e516",
              "status": "affected",
              "version": "4ce6e2db00de8103a0687fb0f65fd17124a51aaa",
              "versionType": "git"
            },
            {
              "lessThan": "7678abee0867e6b7fb89aa40f6e9f575f755fb37",
              "status": "affected",
              "version": "4ce6e2db00de8103a0687fb0f65fd17124a51aaa",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "2b5128c714d863cd8d259aa9d87bed2d6aa6a5a8",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "c67ed40b1b4a66e3a13b21bdfbd0151639da5240",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/block/virtio_blk.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.8"
            },
            {
              "lessThan": "6.8",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.289",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.233",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.176",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.123",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.69",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.289",
                  "versionStartIncluding": "5.4.270",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.233",
                  "versionStartIncluding": "5.10.211",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.176",
                  "versionStartIncluding": "5.15.150",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.123",
                  "versionStartIncluding": "6.1.80",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.69",
                  "versionStartIncluding": "6.6.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.8",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.308",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.7.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: don\u0027t keep queue frozen during system suspend\n\nCommit 4ce6e2db00de (\"virtio-blk: Ensure no requests in virtqueues before\ndeleting vqs.\") replaces queue quiesce with queue freeze in virtio-blk\u0027s\nPM callbacks. And the motivation is to drain inflight IOs before suspending.\n\nblock layer\u0027s queue freeze looks very handy, but it is also easy to cause\ndeadlock, such as, any attempt to call into bio_queue_enter() may run into\ndeadlock if the queue is frozen in current context. There are all kinds\nof -\u003esuspend() called in suspend context, so keeping queue frozen in the\nwhole suspend context isn\u0027t one good idea. And Marek reported lockdep\nwarning[1] caused by virtio-blk\u0027s freeze queue in virtblk_freeze().\n\n[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/\n\nGiven the motivation is to drain in-flight IOs, it can be done by calling\nfreeze \u0026 unfreeze, meantime restore to previous behavior by keeping queue\nquiesced during suspend."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-03T12:59:22.528Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d738f3215bb4f88911ff4579780a44960c8e0ca5"
        },
        {
          "url": "https://git.kernel.org/stable/c/9ca428c6397abaa8c38f5c69133a2299e1efbbf2"
        },
        {
          "url": "https://git.kernel.org/stable/c/6dea8e3de59928974bf157dd0499d3958d744ae4"
        },
        {
          "url": "https://git.kernel.org/stable/c/9e323f856cf4963120e0e3892a84ef8bd764a0e4"
        },
        {
          "url": "https://git.kernel.org/stable/c/12c0ddd6c551c1e438b087f874b4f1223a75f7ea"
        },
        {
          "url": "https://git.kernel.org/stable/c/92d5139b91147ab372a17daf5dc27a5b9278e516"
        },
        {
          "url": "https://git.kernel.org/stable/c/7678abee0867e6b7fb89aa40f6e9f575f755fb37"
        }
      ],
      "title": "virtio-blk: don\u0027t keep queue frozen during system suspend",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-57946",
    "datePublished": "2025-01-21T12:22:53.324Z",
    "dateReserved": "2025-01-19T11:50:08.380Z",
    "dateUpdated": "2025-11-03T20:56:12.738Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:56:12.738Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-57946\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T19:52:30.682704Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-667\", \"description\": \"CWE-667 Improper Locking\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T15:57:56.302Z\"}}], \"cna\": {\"title\": \"virtio-blk: don\u0027t keep queue frozen during system suspend\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"b7bfaea8f5ecd290864f5ae4c69859b89832b4dc\", \"lessThan\": \"d738f3215bb4f88911ff4579780a44960c8e0ca5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"5fe446b245ba61ddc924d7db280bcd987c39357a\", \"lessThan\": \"9ca428c6397abaa8c38f5c69133a2299e1efbbf2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2a52590ac52394540351d8289cc2af0b83cf7d31\", \"lessThan\": \"6dea8e3de59928974bf157dd0499d3958d744ae4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"db48acce75d73dfe51c43d56893cce067b73cf08\", \"lessThan\": \"9e323f856cf4963120e0e3892a84ef8bd764a0e4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8946924ff324853df6b7c525a7467d964dfd11c3\", \"lessThan\": \"12c0ddd6c551c1e438b087f874b4f1223a75f7ea\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4ce6e2db00de8103a0687fb0f65fd17124a51aaa\", \"lessThan\": \"92d5139b91147ab372a17daf5dc27a5b9278e516\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4ce6e2db00de8103a0687fb0f65fd17124a51aaa\", \"lessThan\": \"7678abee0867e6b7fb89aa40f6e9f575f755fb37\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2b5128c714d863cd8d259aa9d87bed2d6aa6a5a8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c67ed40b1b4a66e3a13b21bdfbd0151639da5240\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/block/virtio_blk.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.8\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.8\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.289\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.233\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.176\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.123\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.69\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/block/virtio_blk.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d738f3215bb4f88911ff4579780a44960c8e0ca5\"}, {\"url\": \"https://git.kernel.org/stable/c/9ca428c6397abaa8c38f5c69133a2299e1efbbf2\"}, {\"url\": \"https://git.kernel.org/stable/c/6dea8e3de59928974bf157dd0499d3958d744ae4\"}, {\"url\": \"https://git.kernel.org/stable/c/9e323f856cf4963120e0e3892a84ef8bd764a0e4\"}, {\"url\": \"https://git.kernel.org/stable/c/12c0ddd6c551c1e438b087f874b4f1223a75f7ea\"}, {\"url\": \"https://git.kernel.org/stable/c/92d5139b91147ab372a17daf5dc27a5b9278e516\"}, {\"url\": \"https://git.kernel.org/stable/c/7678abee0867e6b7fb89aa40f6e9f575f755fb37\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvirtio-blk: don\u0027t keep queue frozen during system suspend\\n\\nCommit 4ce6e2db00de (\\\"virtio-blk: Ensure no requests in virtqueues before\\ndeleting vqs.\\\") replaces queue quiesce with queue freeze in virtio-blk\u0027s\\nPM callbacks. And the motivation is to drain inflight IOs before suspending.\\n\\nblock layer\u0027s queue freeze looks very handy, but it is also easy to cause\\ndeadlock, such as, any attempt to call into bio_queue_enter() may run into\\ndeadlock if the queue is frozen in current context. There are all kinds\\nof -\u003esuspend() called in suspend context, so keeping queue frozen in the\\nwhole suspend context isn\u0027t one good idea. And Marek reported lockdep\\nwarning[1] caused by virtio-blk\u0027s freeze queue in virtblk_freeze().\\n\\n[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/\\n\\nGiven the motivation is to drain in-flight IOs, it can be done by calling\\nfreeze \u0026 unfreeze, meantime restore to previous behavior by keeping queue\\nquiesced during suspend.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.289\", \"versionStartIncluding\": \"5.4.270\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.233\", \"versionStartIncluding\": \"5.10.211\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.176\", \"versionStartIncluding\": \"5.15.150\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.123\", \"versionStartIncluding\": \"6.1.80\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.69\", \"versionStartIncluding\": \"6.6.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.8\", \"versionStartIncluding\": \"6.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.13\", \"versionStartIncluding\": \"6.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.19.308\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.7.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-09-03T12:59:22.528Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-57946\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:56:12.738Z\", \"dateReserved\": \"2025-01-19T11:50:08.380Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-01-21T12:22:53.324Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…